CVE Vulnerabilities

CVE-2023-41842

Use of Externally-Controlled Format String

Published: Mar 12, 2024 | Modified: Jan 14, 2026
CVSS 3.x
6.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A use of externally-controlled format string vulnerability [CWE-134] vulnerability in Fortinet allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
FortianalyzerFortinet6.2.0 (including)7.0.10 (excluding)
FortianalyzerFortinet7.2.0 (including)7.2.4 (excluding)
FortianalyzerFortinet7.4.0 (including)7.4.2 (excluding)
Fortianalyzer_big_dataFortinet6.4.5 (including)6.4.7 (including)
Fortianalyzer_big_dataFortinet7.0.1 (including)7.0.6 (including)
Fortianalyzer_big_dataFortinet7.2.0 (including)7.2.6 (excluding)
Fortianalyzer_big_dataFortinet6.2.5 (including)6.2.5 (including)
FortimanagerFortinet6.2.0 (including)7.0.10 (excluding)
FortimanagerFortinet7.2.0 (including)7.2.4 (excluding)
FortimanagerFortinet7.4.0 (including)7.4.2 (excluding)
FortiportalFortinet5.3.0 (including)6.0.15 (excluding)

Potential Mitigations

References